• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.03 seconds

Prediction of Power Consumption for Improving QoS in an Energy Saving Server Cluster Environment (에너지 절감형 서버 클러스터 환경에서 QoS 향상을 위한 소비 전력 예측)

  • Cho, Sungchoul;Kang, Sanha;Moon, Hungsik;Kwak, Hukeun;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.47-56
    • /
    • 2015
  • In an energy saving server cluster environment, the power modes of servers are controlled according to load situation, that is, by making ON only minimum number of servers needed to handle current load while making the other servers OFF. This algorithm works well under normal circumstances, but does not guarantee QoS under abnormal circumstances such as sharply rising or falling loads. This is because the number of ON servers cannot be increased immediately due to the time delay for servers to turn ON from OFF. In this paper, we propose a new prediction algorithm of the power consumption for improving QoS under not only normal but also abnormal circumstances. The proposed prediction algorithm consists of two parts: prediction based on the conventional time series analysis and prediction adjustment based on trend analysis. We performed experiments using 15 PCs and compared performance for 4 types of conventional time series based prediction methods and their modified methods with our prediction algorithm. Experimental results show that Exponential Smoothing with Trend Adjusted (ESTA) and its modified ESTA (MESTA) proposed in this paper are outperforming among 4 types of prediction methods in terms of normalized QoS and number of good reponses per power consumed, and QoS of MESTA proposed in this paper is 7.5% and 3.3% better than that of conventional ESTA for artificial load pattern and real load pattern, respectively.

The Design and Implementation of a Effective web-based electronic mailing system (효율적인 웹기반 전자 우편 시스템의 설계 및 구현)

  • An, Syung-Og;Yoo, Sung-Jung;Yoo, Hyun-Ggung
    • The Journal of Engineering Research
    • /
    • v.4 no.1
    • /
    • pp.5-22
    • /
    • 2002
  • With the rapid advance of internet service and the corresponding migration of service environment from the text-based one to WWW (World Wide Web) environment, the number of internet users is growing rapidly due to its easy usage. Accordingly, usage of internet as services for sending electronic mails to the other party over the network is becoming increasingly prevalent. Web-based electronic mailing system is comprised of a server and a client. The former provides the users with e-mail accounts and services, while the latter serves as a user interface. In other words, it enables those public users who dos not own e-mail accounts on the existing mail server to have an access to the mailing service through the web. In this paper, we designed a effective web-based electronic mailing system which is based on the internet explorer and linux operating system, which overcomes limitations of the existing e-mail systems and meets the need of a cost-efficient alternative. Our electronic mailing system also supports the convenience of users through appropriate handling of preregistered spam e-mails and multiple e-mails, and this facilitates the development of a stable e-mail system by being able to avoiding the low system performance due to the bursty characteristics of e-mail messages and the increasing number of users

  • PDF

RealTime Personal Video Image Protection on CCTV System using Intelligent IP Camera (지능형 IP 카메라를 이용한 CCTV 시스템에서의 실시간 개인 영상정보 보호)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.120-125
    • /
    • 2016
  • For the purpose of protecting personal property and lives from incidents, accidents, and threats such as terrorism, video surveillance equipment has been installed and operates in many places. Video surveillance technology has gradually developed into high-quality, high-definition equipment, and a lot of products have been launched. However, closed circuit television (CCTV) equipment for security purposes can invade a person's privacy. In this paper, we propose a way to protect personal video images using meta-data in an intelligent Internet protocol (IP) camera. We designed the system to mask personal video information from meta-data, define the method of image-information access according to user privileges, and show how to utilize the meta-data during storage and recorded data searches. The suggested system complies with guidelines for CCTV installation and operation from Korea's Ministry of the Interior. Installed on only a single server so far, due to the limitations and technical difficulties of hardware performance, it has been difficult to find a method that can be applied to personal image information using real-time protection techniques. Applying the method proposed in this paper can satisfy the guidelines, reduce server costs, and reduce system complexity.

Design and Implementation of a Network Programming Language (네트워크를 고려한 프로그래밍언어의 설계와 구현)

  • Won, Yu-Hun;Han, Tae-Suk
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.11
    • /
    • pp.1359-1371
    • /
    • 1999
  • 대규모 네트워크 상에서 동작하는 분산 시스템의 구현을 위해 제시된 방법 중의 하나인 이동 코드 개념은 네트워크 공유 자원에 접근할 수 있는 효과적인 방법을 제시하였고 이 개념을 지원하는 많은 언어들의 개발을 가져왔다. 개발된 언어들이 가지고 있는 이동 코드를 지원하기 위한 언어 구문과 적용하려는 문제 영역의 특성을 반영한 언어 구문은 네트워크 프로그래밍을 하는데 있어서 효율과 문제 중심의 프로그램의 두 가지를 모두 가능하게 하고 있다. 본 논문에서는 현재 분산 컴퓨팅 환경에서 가장 많이 사용되고 있는 클라이언트-서버 모델을 확장하여 서버의 자원에 접근할 수 있는 또 다른 방법을 가진 모델을 제시하고, 이 모델을 표현할 수 있는 언어를 설계하였다. 설계된 언어는 이동 코드의 개념을 지원함으로써 대규모 네트워크에서 수행되는 프로그램의 작성을 가능하게 하고, 분산 범위 규칙을 채택함으로써 이동 코드의 기술을 일반 함수를 기술하듯 명확한 관점에서 할 수 있도록 하였다. 또한 네트워크 관련 자원들을 언어 구문으로 채택하여 네트워크 프로그래밍을 언어 수준에서 할 수 있도록 하였다. 언어의 이론적인 설계에 그치지 않고 설계된 언어를 수행할 수 있는 실행 시간 지원 시스템을 구현하였다. 실행 시간 지원 시스템은 언어를 해석하고 실행하는 코드 해석기와 이동 코드를 지원하는 네트워크 감독으로 구성되며 설계된 언어를 사용하여 실제로 네트워크 응용 프로그램을 작성하고 테스트 해 볼 수 있다.Abstract Some studies bring up a concept of code mobility as an innovative way to access network resources in order to develop distributed systems working on a large scale network. After that, many languages are suggested to support this concept. In these languages, language constructors for their particular application domains and mobile codes provide both problem-oriented views to the programmer and reasonable performance to the system. In this thesis, we extend the client-server model that is the most popular model in developing distributed systems these days. We propose a model to have another method to access server's resources and extend the C language to implement the proposed model for the large scale network. The new language has capability to build a software working on a large scale network by supporting mobile code and gives a consistent network programming view to the programmer by adapting distributed semantics. The language also makes network programming easy by providing network primitives at the language level. We implement a prototype of run-time system to support this language. The run-time system is composed of two major parts: code-interpreter that interprets and executes the language and network-daemon that supports mobile codes.

User privacy protection model through enhancing the administrator role in the cloud environment (클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.79-84
    • /
    • 2018
  • Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

A Survey of Weather Forecasting Software and Installation of Low Resolution of the GloSea6 Software (기상예측시스템 소프트웨어 조사 및 GloSea6 소프트웨어 저해상도 설치방법 구현)

  • Chung, Sung-Wook;Lee, Chang-Hyun;Jeong, Dong-Min;Yeom, Gi-Hun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.349-361
    • /
    • 2021
  • With the development of technology and the advancement of weather forecasting models and prediction methods, higher performance weather forecasting software has been developed, and more precise and accurate weather forecasting is possible by performing software using supercomputers. In this paper, the weather forecast model used by six major countries is investigated and its characteristics are analyzed, and the Korea Meteorological Administration currently uses it in collaboration with the UK Meteorological Administration since 2012 and explains the GloSea However, the existing GloSea was conducted only on the Meteorological Administration supercomputer, making it difficult for various researchers to perform detailed research by specialized field. Therefore, this paper aims to establish a standard experimental environment in which the low-resolution version based on GloSea6 currently used in Korea can be used in local systems and test it to present the localization of low-resolution GloSea6 that can be performed in the laboratory environment. In other words, in this paper, the local portability of low-resolution Globe6 is verified by establishing a basic architecture consisting of a user terminal-calculation server-repository server and performing execution tests of the software.

A Study on the Compositions and Applications of Video Solution for Small-sized Theater Performance:Focused on the Musical (소극장 공연에 적합한 영상 솔루션 구성과 활용방안 연구 : 뮤지컬 <트레이스 유(2018)>를 중심으로)

  • Kim, Kyu-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.359-369
    • /
    • 2019
  • This research suggests video solutions and efficient implementations for low-budget performances. This study adopts Millumin as a mapping server, which reflects the character of small theatres with a lower budget that doesn't use more than four projectors in a show. By comparing pros and cons of media servers, the study discovers how to employ an appropriate server as well as to participate in a pre-video production stage, which increases the artistry of directing and reduces unnecessary graphics. Meanwhile, with the participation of an interpretive programmer, this study suggests a way to manage the rehearsal time and to increase the artistry of directing. In addition, this study analyses the relationship between the video's visual motive source in the story's development, crisis, climax, twist and the provided narrative based on "Trace U the musical (2018)", by this analyzation, the relationship between storytelling and the video is fully shown. A visual motive is related to the action of actors, the movement of dancers, the music, the lyrics and the lines. Furthermore, the provided narrative confirms that the existence of an actual relationship with the turning point of the plots, characters' emotion, suggestions of sub-plot and the twists of own story. In conclusion, it implies a video of small theatres can not be separated from the probability of the narrative.sh an efficient ad execution strategy that reflected the characteristics of mobile devices.

Economic analysis of integrated data analysis at variety marine protocols (다양한 해양 프로토콜의 분류 및 통합 데이터를 분석한 독립서버에 대한 경제적 분석)

  • Jang, Hyun-Young;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.243-246
    • /
    • 2016
  • Data transfer technique is one of the key elements of the IT infrastructure, in accordance with each environment and function, using some kind of protocol. Using the three protocols such as WCDMA, AIS, and TRS at sea IT industry. so It uses three protocols saw has a problem that the operation of each protocol-specific server. so server maintenance costs increase and sea Device Manager has been placed in a situation which operates to develop each of the protocol-specific analysis program. The reason of the protocol is divided into three, marine equipment (lighthouses, buoys, light buoy) manufacturing companies and the date of manufacture, such as, communication environment (distance, communication speed) because such is wrong all, trying to unify this and enormous cost and time is a situation that can not be the exchange occurred when. So in the Ministry of Maritime Affairs and Fisheries, the number of frequency of use is low, communication performance is seeking to refrain from Kure each local organizations and companies the use of low TRS protocol. his paper is intended to conduct research on the basis of the actual data to analyze whether the method is how economical to store a single DB by analyzing other types of protocols. This reduces the shortage of marine IT industry, even a little, shall helps reduce administrative costs.

  • PDF

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

A Resource Management Scheme Based on Live Migrations for Mobility Support in Edge-Based Fog Computing Environments (에지 기반 포그 컴퓨팅 환경에서 이동성 지원을 위한 라이브 마이그레이션 기반 자원 관리 기법)

  • Lim, JongBeom
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.4
    • /
    • pp.163-168
    • /
    • 2022
  • As cloud computing and the Internet of things are getting popular, the number of devices in the Internet of things computing environments is increasing. In addition, there exist various Internet-based applications, such as home automation and healthcare. In turn, existing studies explored the quality of service, such as downtime and reliability of tasks for Internet of things applications. To enhance the quality of service of Internet of things applications, cloud-fog computing (combining cloud computing and edge computing) can be used for offloading burdens from the central cloud server to edge servers. However, when devices inherit the mobility property, continuity and the quality of service of Internet of things applications can be reduced. In this paper, we propose a resource management scheme based on live migrations for mobility support in edge-based fog computing environments. The proposed resource management algorithm is based on the mobility direction and pace to predict the expected position, and migrates tasks to the target edge server. The performance results show that our proposed resource management algorithm improves the reliability of tasks and reduces downtime of services.